Skip to content

Commit

Permalink
Merge pull request #3 from mktrm/jihunhwang-patch-2
Browse files Browse the repository at this point in the history
Update week-04.md
  • Loading branch information
jihunhwang authored Oct 11, 2023
2 parents 4c5f699 + 3a072ef commit a234746
Show file tree
Hide file tree
Showing 6 changed files with 18 additions and 18 deletions.
6 changes: 3 additions & 3 deletions _modules/week-02.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,11 +10,11 @@ Aug 28


Aug 30
: [Buffer Overflow Attacks](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853)
: [Buffer Overflow Attacks](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155049/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Read: [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.</span></details>

Sep 01
: [Buffer Overflow Attacks 2](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853)
: [Buffer Overflow Attacks 2](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155050/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Same as prev lecture: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.</span></details>
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Same as prev lecture: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.</span></details>
6 changes: 3 additions & 3 deletions _modules/week-03.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ Sep 04


Sep 06
: [Buffer Overflow Attacks 3](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853)
: [Buffer Overflow Attacks 3](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155051/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Same as prev lectures: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.</span></details>

Sep 08
: [Buffer Overflow Attacks 4](https://purdue.brightspace.com/d2l/le/content/832199/Home?itemIdentifier=D2L.LE.Content.ContentObject.ModuleCO-14109853)
: [Buffer Overflow Attacks 4](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14155052/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Same as prev lectures: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.</span></details>
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Same as prev lectures: Read [Smashing the Stack for Fun and Profit by Aleph One](http://phrack.org/issues/49/14.html#article); Optional: 0×300-0×320 from [Hacking book](http://www.lib.purdue.edu/holdings?isbn=9781593271442&course=202410-CS-42600). 0×200-0×270 if you don't have a strong C background.</span></details>
6 changes: 3 additions & 3 deletions _modules/week-04.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,19 +6,19 @@ title: Week-4


Sep 11
: [Buffer Overflow Defenses 1]()
: [Buffer Overflow Defenses 1](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14177373/View)
: [**HW1 Due**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14099764/View){: .label .label-yellow }[**HW2 Release**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14161251/View){: .label .label-purple }
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> Read [ASLR](https://pax.grsecurity.net/docs/aslr.txt); [NOEXEC](https://pax.grsecurity.net/docs/noexec.txt).</span></details>


Sep 13
: [Buffer Overflow Defenses 2]()
: [Buffer Overflow Defenses 2](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14177374/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> Same as prev lecture: Read [ASLR](https://pax.grsecurity.net/docs/aslr.txt); [NOEXEC](https://pax.grsecurity.net/docs/noexec.txt).</span></details>



Sep 15
: [Buffer Overflow Defenses 3]()
: [Buffer Overflow Defenses 3](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14177375/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> Same as prev lecture: Read [ASLR](https://pax.grsecurity.net/docs/aslr.txt); [NOEXEC](https://pax.grsecurity.net/docs/noexec.txt).</span></details>
6 changes: 3 additions & 3 deletions _modules/week-05.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,17 +3,17 @@ title: Week-5
---

Sep 18
: [Memory safety (ROP)]()
: [Memory safety (ROP)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210247/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> [Read: Low-Level Software Security by Example by Ulfar Erlingsson et al](https://lirias.kuleuven.be/retrieve/110131). Optional: [The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) by Hovav Shacham](https://hovav.net/ucsd/dist/geometry.pdf), [Hacking Blind by Andrea Bittau et al.](https://www.scs.stanford.edu/~sorbo/brop/bittau-brop.pdf)</span></details>

Sep 20
: [Memory safety (CFI)]()
: [Memory safety (CFI)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210248/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> Same as prev lecture and Optional: [Control-Flow Integrity by Martin Abadi et al.](http://www.cs.columbia.edu/~suman/secure_sw_devel/p340-abadi.pdf) </span></details>

Sep 22
: [Memory safety (Heap)]()
: [Memory safety (Heap)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210246/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> [Fantastic memory issues and how to fix them by Eric Rescorla](https://educatedguesswork.org/posts/memory-safety/) and [Understanding glibc malloc by sploitfun](https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/)
Optional: [Advanced Doug lea's malloc exploits by jp](http://phrack.org/issues/61/6.html), [Automatic Techniques to Systematically Discover New Heap Exploitation Primitives by Insu Yun et al.](https://www.usenix.org/conference/usenixsecurity20/presentation/yun)</span></details>
Expand Down
6 changes: 3 additions & 3 deletions _modules/week-06.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,22 +4,22 @@ title: "Week-6"


Sep 25
: [Memory safety (Heap & Int Overflow)]()
: [Memory safety (Heap & Int Overflow)](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14210248/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1> Same as prev lecture. [Fantastic memory issues and how to fix them by Eric Rescorla](https://educatedguesswork.org/posts/memory-safety/) and [Understanding glibc malloc by sploitfun](https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/)
Optional: [Advanced Doug lea's malloc exploits by jp](http://phrack.org/issues/61/6.html), [Automatic Techniques to Systematically Discover New Heap Exploitation Primitives by Insu Yun et al.](https://www.usenix.org/conference/usenixsecurity20/presentation/yun)</span></details>



Sep 27
: [Sandboxing and Isolation]()
: [Sandboxing and Isolation](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14239413/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Watch: [USENIX Security talk](https://www.usenix.org/conference/usenixsecurity20/presentation/narayan) by Shravan Narayan
Read: [The Road to Less Trusted Code: Lowering the Barrier to In-process Sandboxing](https://cseweb.ucsd.edu/~dstefan/noindex/login2020/) by Garfinkel et al.
Optional: [Retrofitting Fine Grain Isolation in the Firefox Renderer](https://cseweb.ucsd.edu/~dstefan/pubs/narayan:2020:rlbox.pdf) by Narayan et al., [Operating System Security](http://www.morganclaypool.com/doi/abs/10.2200/S00126ED1V01Y200808SPT001) by Trent Jaeger, [Android System and kernel security](https://source.android.com/security/overview/kernel-security), and https://www.apple.com/business/docs/iOS_Security_Guide.pdf</span></details>

Sep 29
: [Sandboxing and Isolation]()
: [Sandboxing and Isolation](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14239412/View)
:
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>SAME as prev lecture: Watch: [USENIX Security talk](https://www.usenix.org/conference/usenixsecurity20/presentation/narayan) by Shravan Narayan
Read: [The Road to Less Trusted Code: Lowering the Barrier to In-process Sandboxing](https://cseweb.ucsd.edu/~dstefan/noindex/login2020/) by Garfinkel et al.
Expand Down
6 changes: 3 additions & 3 deletions _modules/week-07.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,18 +4,18 @@ title: 'Week-7'


Oct 02
: [Sandboxing and Isolation]()
: [Sandboxing and Isolation](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14676358/View)
: [**HW2 Due**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14161251/View){: .label .label-yellow }
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>SAME as prev lecture: Watch: [USENIX Security talk](https://www.usenix.org/conference/usenixsecurity20/presentation/narayan) by Shravan Narayan
Read: [The Road to Less Trusted Code: Lowering the Barrier to In-process Sandboxing](https://cseweb.ucsd.edu/~dstefan/noindex/login2020/) by Garfinkel et al.
Optional: [Retrofitting Fine Grain Isolation in the Firefox Renderer](https://cseweb.ucsd.edu/~dstefan/pubs/narayan:2020:rlbox.pdf) by Narayan et al., [Operating System Security](http://www.morganclaypool.com/doi/abs/10.2200/S00126ED1V01Y200808SPT001) by Trent Jaeger, [Android System and kernel security](https://source.android.com/security/overview/kernel-security), and https://www.apple.com/business/docs/iOS_Security_Guide.pdf</span></details>

Oct 04
: [Side Channels 1]()
: [Side Channels 1](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14676366/View)
: [**HW3 Release**](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14256149/View){: .label .label-purple }
: <details title="recommended readings" class="my"><summary><i class="icon fas fa-book-reader "></i></summary><span class="fs-2" markdown=1>Read:[Spectre Attacks: Exploiting Speculative Execution](https://spectreattack.com/spectre.pdf) by Paul Kocher et al.</span></details>


Oct 06
: [Side Channels 2]()
: [Side Channels 2](https://purdue.brightspace.com/d2l/le/content/832199/viewContent/14676372/View)
:

0 comments on commit a234746

Please sign in to comment.